Information flow model of integrated security system

The goal of this paper is to study the effectivity and reliability of signal transferring by security systems via communication channels, as well as to define the main criteria of the available communication channels affecting the total response time of security systems. This paper mainly models and...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Valinevicius, A., Zilys, M., Eidukas, D.
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 572 Vol.1
container_issue
container_start_page 567
container_title
container_volume
creator Valinevicius, A.
Zilys, M.
Eidukas, D.
description The goal of this paper is to study the effectivity and reliability of signal transferring by security systems via communication channels, as well as to define the main criteria of the available communication channels affecting the total response time of security systems. This paper mainly models and empirically solves the following tasks: application of information theory on streams in telecommunication systems to integrated security systems and calculations of system losses. With respect to the fundamentals of massive service systems, a model is imitated for the security systems. Using this model, experiments on the reliability and effectiveness of security systems are performed, so as to find more effective and reliable operating algorithms for security systems
format Conference Proceeding
fullrecord <record><control><sourceid>pascalfrancis_6IE</sourceid><recordid>TN_cdi_pascalfrancis_primary_16368900</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>1372477</ieee_id><sourcerecordid>16368900</sourcerecordid><originalsourceid>FETCH-LOGICAL-i135t-3f527bcb40355067baed2397cb1ab57f3a546d7fd9b02652ce9c19f1bec15e253</originalsourceid><addsrcrecordid>eNpFj8tKBDEURAMiqO18gZtsXDZ0cvsmZimDj4EBN7oe8riRSHdnSCLSf-_ACNamFqc4UBfsxiAYpZUx4optav0aTgGDctDXbNwtMZfZtpQXHqf8w-ccaOI58rQ0-iy2UeCV_HdJbeV1rY3mW3YZ7VRp89cd-3h-et--9vu3l932cd8nAdh6iCi1824cAHFQ2lkKEoz2TliHOoLFUQUdg3GDVCg9GS9MFI68QJIIHbs_e4-2ejvFYhef6uFY0mzLehAK1IM5fenY3XmXiOgfg5aj1vALguRLaw</addsrcrecordid><sourcetype>Index Database</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Information flow model of integrated security system</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Valinevicius, A. ; Zilys, M. ; Eidukas, D.</creator><creatorcontrib>Valinevicius, A. ; Zilys, M. ; Eidukas, D.</creatorcontrib><description>The goal of this paper is to study the effectivity and reliability of signal transferring by security systems via communication channels, as well as to define the main criteria of the available communication channels affecting the total response time of security systems. This paper mainly models and empirically solves the following tasks: application of information theory on streams in telecommunication systems to integrated security systems and calculations of system losses. With respect to the fundamentals of massive service systems, a model is imitated for the security systems. Using this model, experiments on the reliability and effectiveness of security systems are performed, so as to find more effective and reliable operating algorithms for security systems</description><identifier>ISBN: 9539676991</identifier><identifier>ISBN: 9789539676993</identifier><language>eng</language><publisher>Zagreb: IEEE</publisher><subject>Applied sciences ; Communication channels ; Communication system security ; Computer science; control theory; systems ; Computer systems and distributed systems. User interface ; Delay ; Exact sciences and technology ; Information security ; Information systems. Data bases ; Information theory ; Memory organisation. Data processing ; Protection ; Protocols ; Reliability engineering ; Software ; Telephony ; Wire</subject><ispartof>26th International Conference on Information Technology Interfaces, 2004, 2004, p.567-572 Vol.1</ispartof><rights>2005 INIST-CNRS</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/1372477$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2058,4050,4051,54920</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/1372477$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc><backlink>$$Uhttp://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&amp;idt=16368900$$DView record in Pascal Francis$$Hfree_for_read</backlink></links><search><creatorcontrib>Valinevicius, A.</creatorcontrib><creatorcontrib>Zilys, M.</creatorcontrib><creatorcontrib>Eidukas, D.</creatorcontrib><title>Information flow model of integrated security system</title><title>26th International Conference on Information Technology Interfaces, 2004</title><addtitle>ITI</addtitle><description>The goal of this paper is to study the effectivity and reliability of signal transferring by security systems via communication channels, as well as to define the main criteria of the available communication channels affecting the total response time of security systems. This paper mainly models and empirically solves the following tasks: application of information theory on streams in telecommunication systems to integrated security systems and calculations of system losses. With respect to the fundamentals of massive service systems, a model is imitated for the security systems. Using this model, experiments on the reliability and effectiveness of security systems are performed, so as to find more effective and reliable operating algorithms for security systems</description><subject>Applied sciences</subject><subject>Communication channels</subject><subject>Communication system security</subject><subject>Computer science; control theory; systems</subject><subject>Computer systems and distributed systems. User interface</subject><subject>Delay</subject><subject>Exact sciences and technology</subject><subject>Information security</subject><subject>Information systems. Data bases</subject><subject>Information theory</subject><subject>Memory organisation. Data processing</subject><subject>Protection</subject><subject>Protocols</subject><subject>Reliability engineering</subject><subject>Software</subject><subject>Telephony</subject><subject>Wire</subject><isbn>9539676991</isbn><isbn>9789539676993</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2004</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNpFj8tKBDEURAMiqO18gZtsXDZ0cvsmZimDj4EBN7oe8riRSHdnSCLSf-_ACNamFqc4UBfsxiAYpZUx4optav0aTgGDctDXbNwtMZfZtpQXHqf8w-ccaOI58rQ0-iy2UeCV_HdJbeV1rY3mW3YZ7VRp89cd-3h-et--9vu3l932cd8nAdh6iCi1824cAHFQ2lkKEoz2TliHOoLFUQUdg3GDVCg9GS9MFI68QJIIHbs_e4-2ejvFYhef6uFY0mzLehAK1IM5fenY3XmXiOgfg5aj1vALguRLaw</recordid><startdate>2004</startdate><enddate>2004</enddate><creator>Valinevicius, A.</creator><creator>Zilys, M.</creator><creator>Eidukas, D.</creator><general>IEEE</general><general>University Computing Centre</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope><scope>IQODW</scope></search><sort><creationdate>2004</creationdate><title>Information flow model of integrated security system</title><author>Valinevicius, A. ; Zilys, M. ; Eidukas, D.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i135t-3f527bcb40355067baed2397cb1ab57f3a546d7fd9b02652ce9c19f1bec15e253</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2004</creationdate><topic>Applied sciences</topic><topic>Communication channels</topic><topic>Communication system security</topic><topic>Computer science; control theory; systems</topic><topic>Computer systems and distributed systems. User interface</topic><topic>Delay</topic><topic>Exact sciences and technology</topic><topic>Information security</topic><topic>Information systems. Data bases</topic><topic>Information theory</topic><topic>Memory organisation. Data processing</topic><topic>Protection</topic><topic>Protocols</topic><topic>Reliability engineering</topic><topic>Software</topic><topic>Telephony</topic><topic>Wire</topic><toplevel>online_resources</toplevel><creatorcontrib>Valinevicius, A.</creatorcontrib><creatorcontrib>Zilys, M.</creatorcontrib><creatorcontrib>Eidukas, D.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection><collection>Pascal-Francis</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Valinevicius, A.</au><au>Zilys, M.</au><au>Eidukas, D.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Information flow model of integrated security system</atitle><btitle>26th International Conference on Information Technology Interfaces, 2004</btitle><stitle>ITI</stitle><date>2004</date><risdate>2004</risdate><spage>567</spage><epage>572 Vol.1</epage><pages>567-572 Vol.1</pages><isbn>9539676991</isbn><isbn>9789539676993</isbn><abstract>The goal of this paper is to study the effectivity and reliability of signal transferring by security systems via communication channels, as well as to define the main criteria of the available communication channels affecting the total response time of security systems. This paper mainly models and empirically solves the following tasks: application of information theory on streams in telecommunication systems to integrated security systems and calculations of system losses. With respect to the fundamentals of massive service systems, a model is imitated for the security systems. Using this model, experiments on the reliability and effectiveness of security systems are performed, so as to find more effective and reliable operating algorithms for security systems</abstract><cop>Zagreb</cop><pub>IEEE</pub><tpages>6</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISBN: 9539676991
ispartof 26th International Conference on Information Technology Interfaces, 2004, 2004, p.567-572 Vol.1
issn
language eng
recordid cdi_pascalfrancis_primary_16368900
source IEEE Electronic Library (IEL) Conference Proceedings
subjects Applied sciences
Communication channels
Communication system security
Computer science
control theory
systems
Computer systems and distributed systems. User interface
Delay
Exact sciences and technology
Information security
Information systems. Data bases
Information theory
Memory organisation. Data processing
Protection
Protocols
Reliability engineering
Software
Telephony
Wire
title Information flow model of integrated security system
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-27T02%3A43%3A01IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-pascalfrancis_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Information%20flow%20model%20of%20integrated%20security%20system&rft.btitle=26th%20International%20Conference%20on%20Information%20Technology%20Interfaces,%202004&rft.au=Valinevicius,%20A.&rft.date=2004&rft.spage=567&rft.epage=572%20Vol.1&rft.pages=567-572%20Vol.1&rft.isbn=9539676991&rft.isbn_list=9789539676993&rft_id=info:doi/&rft_dat=%3Cpascalfrancis_6IE%3E16368900%3C/pascalfrancis_6IE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=1372477&rfr_iscdi=true